This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2024-39842.
Yearly Archives: 2024
GLSA 202411-04: EditorConfig core C library: arbitrary stack write
GLSA 202411-05: libgit2: Multiple Vulnerabilities
GLSA 202411-03: Ubiquiti UniFi: Privilege Escalation
GLSA 202411-02: Flatpak: Sandbox Escape
GLSA 202411-01: Neat VNC: Authentication Bypass
webkit2gtk4.0-2.46.3-1.fc41
FEDORA-2024-58de5ad94f
Packages in this update:
webkit2gtk4.0-2.46.3-1.fc41
Update description:
Update to 2.46.3
webkit2gtk4.0-2.46.3-1.fc40
FEDORA-2024-8f88cdf4e5
Packages in this update:
webkit2gtk4.0-2.46.3-1.fc40
Update description:
Update to 2.46.3
python3.6-3.6.15-38.fc40
FEDORA-2024-c8cc025262
Packages in this update:
python3.6-3.6.15-38.fc40
Update description:
Security fix for CVE-2024-9287 (rhbz#2321659)
USN-7093-1: Werkzeug vulnerability
It was discovered that Werkzeug incorrectly handled multiple form
submission requests. A remote attacker could possibly use this issue to
cause Werkzeug to consume resources, leading to a denial of service.